Web App Penetration Testing - #10 - XSS(Reflected, Stored & DOM)

Поділитися
Вставка
  • Опубліковано 16 вер 2024
  • Hey guys! HackerSploit here back again with another video, in this video, I will be demonstrating how to perform XSS attacks.
    Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.
    OWASP BWAP: www.owasp.org/...
    ⭐Help Support HackerSploit by using the following links:
    🔗 NordVPN: nordvpn.org/ha...
    Use the link above or the code below for 77% Off your order
    Promo Code: hacker
    Patreon: / hackersploit
    I Hope you enjoy/enjoyed the video.
    If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
    🔗 HackerSploit Website: hsploit.com/
    🔗 HackerSploit Android App: play.google.co...
    🔹 Support The Channel
    NordVPN Affiliate Link: nordvpn.org/ha...
    Patreon: / hackersploit
    🔹 Get Our Courses
    Get a special discount on our courses:
    The Complete Deep Web Course 2018:
    www.udemy.com/...
    🔹 SOCIAL NETWORKS - Connect With Us!
    -------------------------------
    Facebook: / hackersploit
    Instagram: / alexi_ahmed
    Twitter: / hackersploit
    Patreon: / hackersploit
    --------------------------------
    Thanks for watching!
    Благодаря за гледането
    Kiitos katsomisesta
    感谢您观看
    Merci d'avoir regardé
    Grazie per la visione
    Gracias por ver
    شكرا للمشاهدة
    دیکھنے کے لیے شکریہ
    देखने के लिए धन्यवाद

КОМЕНТАРІ • 104

  • @benvoland
    @benvoland 6 років тому +5

    You are one of the best youtubers that really explain what is going on behind the scenes and not just jumping around with no explaining about it. Thanks you so much!!! Liked it! Hope you will make a part 2 cause this is very intresting and helpfull!!!

  • @alexgameroom
    @alexgameroom 6 років тому +15

    Thanks for this, I'm studying CEH and XSS is something I've struggled with. Very clear and you've explained it better in 17 minutes than the EC Council did in an entire chapter.

  • @danjones3823
    @danjones3823 3 роки тому +1

    Was struggling to understand the difference between DOM and reflected. this was actually clear and helped me understand. keep up the content!

  • @spcfsi4143
    @spcfsi4143 6 років тому +4

    Where's the love button on this thing. Thanks so much. I'm just beginning web app pentesting and you're making my life so much easier with these tutorials. Keep up the excellent work.

  • @BlokeBritish
    @BlokeBritish 3 роки тому +2

    05:09 "remember u hv to be humble" - how very well said man !!!

  • @blog.pymastery
    @blog.pymastery 6 років тому +11

    Half understood! However, I really appreciate.
    I'll be practicing to understand as well as I can!
    Good job! Thank you again.

  • @souravkundu1932
    @souravkundu1932 4 роки тому +3

    Hey, @hackersploit you have not updated the XSS part. Means on high-level security. Such as you said at the end.

  • @ICOFRITE
    @ICOFRITE 6 років тому

    Great work as always Alexis! Loving your work!

  • @joy3658
    @joy3658 Рік тому +1

    This playlist is not complete man! Some videos is not listed here... Please take a look on it again. Like, #8 is missing. I would love to highly request you that please rearrange a full playlist for Web App Penetration Testing

  • @ajaydahiya4651
    @ajaydahiya4651 6 років тому +1

    Very Well Explained Sir. Waiting for the advanced XSS :)

  • @RajKumar-yw8cd
    @RajKumar-yw8cd 3 роки тому

    Best video I ever seen... I understand it faster

  • @oofiebiscuit
    @oofiebiscuit 6 років тому +2

    i finally have account to the hackersploit website

  • @8080VB
    @8080VB 2 роки тому

    Also for dom you can manipulate the site url into anything. .just like what we saw in reflected.

  • @josefprochazka1095
    @josefprochazka1095 5 років тому +3

    DOM based XSS begins at 13:38

  • @MrGFYne1337357
    @MrGFYne1337357 6 років тому

    I'm late, you rock HSploit

    • @HackerSploit
      @HackerSploit  6 років тому

      Thanks, mate, always appreciated.

  • @terrylick5908
    @terrylick5908 6 років тому

    detailed information. just brilliant. all the best and take care.👍

  • @niftyexploits9809
    @niftyexploits9809 6 років тому

    iv been waiting for this part of web app

  • @isfatrianurullah3704
    @isfatrianurullah3704 6 років тому +1

    i have notif for watching your videos.

  • @steiner254
    @steiner254 Рік тому

    Awesome!

  • @BucifalulR
    @BucifalulR 5 років тому +1

    At 14:44, what do you mean by "a language that a client can understand"? As far as I know, Javascript is understood by clients and code between tags can be executed by clients. Also, isn't the "onerror" action in "

    • @neadlead2621
      @neadlead2621 2 роки тому

      I have the same question did u found an answer ?

  • @limitless5000
    @limitless5000 6 років тому

    Great video, really glad I subscribed.

  • @treeboi6371
    @treeboi6371 6 років тому +4

    You should make a video on the raspberry pi 3 , its a fascinating topic and id love to get your opinion on it and how to use kali linux on it.

  • @shakirali3647
    @shakirali3647 6 років тому

    Nice video. Keep up the good work

  • @BRINGOff.07
    @BRINGOff.07 3 роки тому +2

    aw

  • @CyberAbyss007
    @CyberAbyss007 5 років тому +1

    Thank you!

  • @susanapalacios2881
    @susanapalacios2881 4 роки тому

    Thank you! Great work!

  • @SUDARMANHP
    @SUDARMANHP 3 роки тому

    Thank you so much for the video sir....

  • @D.a.n_D
    @D.a.n_D 6 років тому

    Thanks for the great videos !

  • @emilioortega9487
    @emilioortega9487 3 роки тому

    at 14:50 dont understand why code doesn't work if javascript is a client side language... it should work like an html tag or I'm wrong, if so, why? thanks

  • @kevincarter6122
    @kevincarter6122 6 років тому +1

    so what would someone want to do something like this for?

  • @college3848
    @college3848 6 років тому +2

    thanks brother #Alexis.... u r the best....

  • @TheEggroll4321
    @TheEggroll4321 3 роки тому

    So both the website needs to be vulnerable to accept a stored xss and the user's browser that retrieves it needs to be vulnerable for the script to do certain things?

  • @8L4NK_
    @8L4NK_ 6 років тому

    @Alex aka hackersploit....
    Your the Greatest of all time > G.O.A.T

  • @accessdenied9393
    @accessdenied9393 4 роки тому

    I love this man ❤️❤️

  • @aditidogra7367
    @aditidogra7367 5 років тому

    Well explained....thanks

  • @sewaksingh6189
    @sewaksingh6189 6 років тому

    Love your every video ;)

  • @psychorockz123
    @psychorockz123 5 років тому

    I'm confused between DOM-Based XSS and Reflected XSS. I understand they're both affecting the victim on the client side and that reflected uses Javascript and DOM-Based uses AJAX. But is that really it? Could you be more specific?

  • @anon1977
    @anon1977 4 роки тому

    thanks myan i was able to get idea and i find xss on isp payment gateway.

  • @ronakrawal8325
    @ronakrawal8325 6 років тому

    Amazing Video

  • @AbhishekKumar-xv4lw
    @AbhishekKumar-xv4lw 6 років тому +1

    Nice video broo

  • @smashishere
    @smashishere 6 років тому

    So if I go to a website and use the that pop up script in it and it works, does that mean that site would be vulnerable to other scripts? If it does then is it only for xss (get) or both xss (get) and xss (post). Sorry if I'm using the wrong terminology or this is a really stupid question, I'm a noob :p

  • @attscham7820
    @attscham7820 2 роки тому

    reflected, stored, dom -got it. rdy for more

  • @dhanashreedeshpande7100
    @dhanashreedeshpande7100 5 років тому +1

    Please tell me How can we identify XSS attack from access log file? I mean, how it stores footprints over there in log file?

    • @roborbiettinoisgone392
      @roborbiettinoisgone392 4 роки тому

      I don't know man, you made me curious! I will try some stuff and Maybe tell ya

  • @E_N_J.B
    @E_N_J.B 4 роки тому

    Thanks

  • @treeboi6371
    @treeboi6371 6 років тому +2

    Hey there, nice video. Are you thinking about making any new udemy courses??

  • @jottaz144
    @jottaz144 3 роки тому

    Thanks, however, what does it mean for DOM that the input is "processed by the client"? I dont get how to differentiate it from the other 2 XSS attacks.

    • @AliIssa1
      @AliIssa1 2 роки тому

      Hackersploits video is really good. But since you asked for more details on DOM XSS you can check the following video: ua-cam.com/video/ZmNlFNsty9o/v-deo.html

  • @donalee7558
    @donalee7558 4 роки тому

    hi do you have the video this kind of attack XSS but using dvwa or webgoat ?

  • @user-jk6zq1pl6c
    @user-jk6zq1pl6c 4 роки тому

    thank you verry nuch, i should ask you if i found xss in any site how i can exploit it and git the admin page of site ?

  • @Sam-rz5hw
    @Sam-rz5hw 6 років тому

    Thanks you are the best

  • @SarathKumar-zz1bd
    @SarathKumar-zz1bd 3 роки тому

    It's good bro..

  • @victorlefevre4139
    @victorlefevre4139 6 років тому

    Ur the best with hacking
    Im french

  • @ao5468
    @ao5468 6 років тому

    Hi there
    What is the best way to check if the input form field is Vulnerable to xss. The thing is the form field does not do any popup on render tab so it is hard to verify

  • @user-et8es9vg5z
    @user-et8es9vg5z 4 роки тому

    I didn't understand the difference between Cross-site Scripting Reflected and DOM-based cross-site scripting. Can someone explain this to me ? For me he does the same thing in each of these examples.

    • @AliIssa1
      @AliIssa1 2 роки тому

      HackerSploits video is really good. But if you want more info on the difference between the types of XSS then watch: ua-cam.com/video/ZmNlFNsty9o/v-deo.html

  • @randomstranger9494
    @randomstranger9494 6 років тому +1

    Would love an in-depth udemy course on Web Testing :)

  • @vaisakhkm783
    @vaisakhkm783 3 роки тому

    Hello, how can I download your app

  • @nithinrkan
    @nithinrkan 4 роки тому

    how does do i steal another users cookie?

  • @prnxid
    @prnxid 6 років тому +1

    Peace Man. I waiting for the high lvl of bwapp xss's

  • @anujgupta7749
    @anujgupta7749 5 років тому

    How Refected XSS use for Hacking ? I am bit Confused.

    • @brianhartling7767
      @brianhartling7767 5 років тому

      You can create a script to (for example) send info to an email address. You would want to encode that portion and embed the script into the url. Then you could copy the whole malicious url and post the url somewhere you know people will click it and when they do it runs the script.

  • @hiteshagrawal8892
    @hiteshagrawal8892 5 років тому

    can you share some more examples for DOM based XSS

    • @AliIssa1
      @AliIssa1 2 роки тому

      Hackersploits video is really good. But since you asked for more details on DOM XSS you can check the following video: ua-cam.com/video/ZmNlFNsty9o/v-deo.html

  • @niftyexploits9809
    @niftyexploits9809 6 років тому

    also webvuln.com is good for testing for those who dont want to run a vm of a lab

  • @MsSoldadoRaso
    @MsSoldadoRaso 3 роки тому

    Just use Angular.

  • @MidnightSpecter43
    @MidnightSpecter43 2 роки тому

    peace

  • @victorlefevre4139
    @victorlefevre4139 6 років тому

    Can u perform xss pls ?

  • @ijajbargir9621
    @ijajbargir9621 6 років тому

    Ss7 video demo bro

  • @Mr-cn4sm
    @Mr-cn4sm 4 роки тому

    do u have a whassup group
    or a telegram group

  • @jepunband6280
    @jepunband6280 4 роки тому

    hello hackersploit, please do a tutorial on xsser tool.

  • @lick933
    @lick933 6 років тому

    guys what's ARC-4 data

  • @kiramaster2010
    @kiramaster2010 5 років тому

    can we use this attack to upload shell ?

  • @yorumcuturk
    @yorumcuturk 4 роки тому +1

    alert("hi hackan")

    • @yorumcuturk
      @yorumcuturk 4 роки тому +2

      No, it didn't work here.

  • @8080VB
    @8080VB 3 роки тому

    If your new to web app pen testing , you wont understand anything so hit the basic n come back (based on a true story)

  • @donalee7558
    @donalee7558 4 роки тому

    and testing with zap

  • @imranthoufeeque165
    @imranthoufeeque165 6 років тому +2

    First to view and like

  • @animationsongs682
    @animationsongs682 6 років тому +10

    First Like 👍

  • @muhammadmughal4258
    @muhammadmughal4258 3 роки тому

    where is DOM Based XSS ! always time pass videos :-(

    • @AliIssa1
      @AliIssa1 2 роки тому

      HackerSploits video is really good. But since you want more info on DOM-XSS then check the following: ua-cam.com/video/ZmNlFNsty9o/v-deo.html

  • @pamulyadav4275
    @pamulyadav4275 4 роки тому +1

    pleaseeeeee......do more, talk less. Still like your videos.

  • @ZoomAnimationHere
    @ZoomAnimationHere 4 роки тому

    Awesome!